scientific article; zbMATH DE number 1302852
From MaRDI portal
Publication:4249336
Recommendations
- Pseudorandom functions: three decades later
- scientific article; zbMATH DE number 1030978
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Secure message authentication against related-key attack
- Synthesizers and their application to the parallel construction of pseudo-random functions
Cited in
(10)- Minicrypt primitives with algebraic structure and applications
- scientific article; zbMATH DE number 1030978 (Why is no real title available?)
- Efficient non-repudiation multicast source authentication schemes.
- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
- The Hash Function Family LAKE
- Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function
- On the security of multivariate hash functions
- Pseudorandom functions: three decades later
- Pseudorandomness of Camellia-like scheme
- Analysis of Multivariate Hash Functions
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249336)